General

  • Target

    2020-140-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    9b99c2049ad3ebded07f9b3d6bb8bd63

  • SHA1

    fe81d1a92643c71bfbd284cb58fb5cc3dd5b4b55

  • SHA256

    c55ea9b47072defd5a7f683c531f4579cf4312c2d6ec1de24f45551412a86ca9

  • SHA512

    de7d883e7665eb3bb6f16d56a95d1ba4ad9f5abdab1d218026235ad3905706dddbce927ce3388663f9dc167b4f2955e86cb554af0d363fb32c2d413ca0d2d0e6

  • SSDEEP

    3072:IB91HfsHM3E0kbddhtC9+HNf7dNNiBFN/3D:AHUoE0ktZHfN253

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2020-140-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections